Latest Post

Mobile or Cell Phone Virus

Mobile phone virus is an infectious and destructive mobile phone program. It can be transmitted by sending SMS, MMS, email, browsing websites, downloading ringtones, bluetooth, etc., which will cause the user's mobile phone to freeze, shut down, delete personal information, send out spam to leak personal information, automatically call the phone, send malicious deduction of SMS (MMS), etc. will even damage the SIM card, chip and other hardware, resulting in the user's inability to use the mobile phone normally.

 

Cell phone virus Introduction

With the continuous popularity of smart phones, cell phone viruses have become the next target of virus development. Mobile phone virus is a destructive program, and is as contagious and destructive as computer viruses (programs).

Mobile phone viruses can be transmitted by sending SMS, MMS, email, browsing websites, downloading ringtones, Bluetooth, etc. Mobile phone viruses may cause the user's mobile phone to freeze, shut down, delete data, send out spam, make phone calls, etc., and even damage the hardware such as SIM cards and chips.

Nowadays, mobile phone viruses are inspired and influenced by PC viruses, and there are so-called hybrid attacks.

According to a survey report by McAfee, an IT security vendor, the number of mobile phone users who have been attacked by mobile phone viruses worldwide in 2006 has reached about 83%, a five-fold increase from 2003.

 

History of Cell Phone Virus

The earliest mobile phone virus in history appeared in 2000. At that time, the mobile phone company Movistar received a large number of harassing text messages called "Timofonica" sent by the computer. The virus was sent to users in the system through the mobile system of the Spanish telecommunications company "Telefonica".

Spam and other spam messages. In fact, the virus can only be counted as a SMS bomb at most.

The real mobile phone virus did not appear until June 2004, that is, the "Cabir" worm virus, this virus is copied through the Nokia s60 series mobile phones. Then constantly looking for mobile phones with Bluetooth installed. After that, cell phone viruses began to spread.

 

Working principle of Cell Phone Virus

Mobile phone software, embedded operating system (the operating system solidified in the chip, generally written in JAVA, C ++ and other languages), is equivalent to a small intelligent processor, so it will be subject to virus attacks. Moreover, text messages are not just simple text, including information such as ringtones and pictures of mobile phones, which need to be interpreted by the operating system in the mobile phone and then displayed to mobile phone users. Mobile phone viruses invade mobile phones through software system vulnerabilities.

 

Mobile phone virus must be transmitted and run, the necessary condition is that the mobile service provider must provide data transmission function, and the mobile phone needs to support Java and other advanced program writing function. Now many mobile phones with Internet access and download functions may be invaded by mobile phone viruses.

 

Propagation mode of Cell Phone Viruses

Propagation using Bluetooth: "Kapol" virus will modify the system settings of the smart phone, automatically search for the existence of vulnerabilities in neighboring mobile phones through Bluetooth, and attack.

 

Infection of mobile phone executable files on PC: After "Velasco" virus infects the computer, it will search for SIS executable files on the computer's hard disk and infect.

 

Use MMS multimedia information service method to spread: a new mobile phone virus transmission method appeared, spread through MMS multimedia information service method.

 

BUG attack using mobile phones: This kind of virus generally runs on "EPOC" of portable information equipment, such as "EPOC-ALARM", "EPOC-BANDINFO.A", "EPOC-FAKE.A", "EPOC-GHOST. A "," EPOC-ALIGHT.A ", etc.

 

Harm from Cell Phone Viruses

 

1. Cause user information to be stolen

Today, more and more mobile phone users store personal information on their phones, such as personal address book, personal information, schedule, various network accounts, bank accounts and passwords. These important data will inevitably attract some people with ulterior motives. They will write various viruses to invade the mobile phone and steal important information of users.

 

2. Dissemination of illegal information

Now, MMS is popular, and it has facilitated the beginning of the spread of all kinds of pornography, illegal pictures, voices, and movies.

 

3. Destroy mobile phone hardware and software

The most common hazards of mobile phone viruses are the destruction of mobile phone software and hardware, causing the mobile phone to not work properly.

 

4. Cause the communication network to be paralyzed

If the virus infects the mobile phone, the mobile phone is forced to send spam to the communication network where it is located, which will inevitably lead to the communication network information being blocked. These spam messages will eventually paralyze local mobile communication networks.

 

Examples of Cell Phone viruses

Fishing King, Mobile Skeleton, SMS Pirate, Straight Flush Thief, Thousand-Billionaire, QQ Stealing Number, Zombie Phone Virus (Mobile Phone Zombie Virus), CCa.tx.A, MDa.mj.A (3D Dazzling Rubik's Cube, iCalendar, etc.).

 

Kinds of Cell Phone Viruses

Mobile phone viruses can be divided into four categories according to the virus form:

 

1. Viruses transmitted via "wireless transmission" of Bluetooth devices such as Cabir and Lasco.A

 

  Tips:

Cabir

Cabir is a network worm that can infect mobile phones running the "Symbian" operating system. After the virus is found in the mobile phone, the Bluetooth wireless function will be used to scan other neighboring mobile phones with vulnerabilities.

When the vulnerable mobile phone is found, the virus will copy itself and send it to the mobile phone.

 

Lasco

A virus, like the worm virus, is transmitted to other mobile phones via Bluetooth wirelessly. When the user clicks the virus file, the virus is activated immediately.

 

2. Mobile phone viruses targeting mobile communication providers such as Mosquito Trojan

 

  Tips:

The virus is hidden in the cracked version of the mobile game "Mit Mosquito".

Although the virus will not steal or destroy user information, it will automatically dial and send a large amount of text messages to the number in the UK, resulting in a sharp increase in the user's information fee.

 

3. Viruses targeting mobile phone bugs such as mobile hackers

 

  Tips:

 

Hacker (hack.mobile.smsdos) virus spreads through SMS with virus program, as long as the user views the virus-containing SMS, the phone will automatically shut down immediately.

 

4. The "Mobile.SMSDOS" virus

The virus that uses SMS or MMS to attack is a typical example of the "Mobile.SMSDOS" virus that appears against Siemens mobile phones.

 

  Tips:

"Mobile.SMSDOS" virus can be transmitted by SMS or MMS, causing the internal program of the mobile phone to be wrong, which causes the mobile phone to not work properly.

In terms of the impact of current mobile phone viruses, it can be roughly divided into five categories: Joke, distress, physical destruction, money loss and confidentiality injuries.

The following will further discuss the various types of mobile phone viruses caused by the five categories. Different damage conditions and dangers.

 

Influences

Funny influence

This type of joke-type mobile phone virus does not generally cause physical or operational damage or impact on the mobile phone.

 

Mobile phone screen keeps flashing: for example, Lights virus.

 

The screen displays sensational words or scary icons: For example, the Ghost virus will display the "Everyone hates you" message.

 

Continuous beeps: For example, FalseAlarm virus.

 

Small flying planes appear on the screen: for example, Sprite virus.

 

A formatted disk message appears: For example, Fake virus does not actually cause any harm.

 

Pretend to download malicious programs: such as Alone virus.

 

Automatically start phone recording.

 

Disturbing destruction

 

The so-called troublesome mobile phone virus, although it will not destroy or suspend the physical or operational of the mobile phone, but it causes troubles in the use of the mobile phone, and even further prevents the update of the mobile phone software.

 

Sending and receiving spam text messages

Many mobile phone viruses use a lot of spam text messages to attack mobile phones.

Although spam text messages are not necessarily dangerous, they consume the precious time of recipients and add many troubles, not to mention that spam text messages are likely to hide viruses.

Once poisoned, users may also become zombies or accomplices who send spam messages without knowing it. For example, the samurai worm will send a message containing the virus according to the recorded message in the victim's mobile phone.

 

Cell Phones virus

Block any updates and downloads of mobile phones

For example, the Fontal Trojan, by destroying the program manager in the mobile phone system, prevents users from downloading new applications or other updates, and also prevents the mobile phone from deleting viruses.

 

Application does not work: For example, the skull Trojan will cause the file system or application of the mobile phone to not work, the user must restart.

 

Consumption of mobile phone power: for example, the piranha (Cabir) worm, through continuous search for other Bluetooth devices, and then exhausted mobile phone power.

 

Block Bluetooth communication: block the communication and connection between the mobile phone and any Bluetooth device, such as headphones, printers, or other Bluetooth mobile phones.

 

Interrupt the operation of the SMS service

The hacker launched a DDoS attack on the MMS server, which caused the SMS service to fail to operate normally. Symantec said that the very popular Blackberry mobile phone (Blackberry) has been attacked by the server, which has caused users to receive letters for up to 3 hours.

 

Physical or operational destruction

The physical or operational damage is a very serious result. Not only can users not continue to use the phone normally, but the most important thing is the destruction of important data.

 

Mobile phone crashes: For example, a hacker can launch an attack through a vulnerability in the mobile phone operating system, which can cause the operating system to shut down.

 

Automatic cell phone shutdown: Frequent switching on and off may cause damage to cell phone parts or life.

 

Loss of file information: including the loss of files such as phonebook, address book, MP3, games, photos, and picture bells. For example, Skull Head Trojan.

 

Paralyzed mobile phone anti-virus software: disguised as an update code of an anti-virus manufacturer, tricked users into downloading, and then paralyzed mobile phone anti-virus software.

 

The key function of mobile phone is lost

For example, SYMBOS_LOCKNUT Trojan.

 

Format internal memory

If the mobile phone has a built-in hard disk in the future, it may also face the risk of being formatted.

 

The hacker obtains the permission of the mobile phone system

The hacker can obtain partial or even full permissions of the system without the user's consent through the vulnerability of the mobile phone operating system. For example, the Brador backdoor program specializing in WinCE mobile phones, poisoned mobile phones will be remotely downloaded files by hackers, or even execute specific commands.

 

Burn out internal chip

It is rumored that once a Trojan is executed, it will cause the mobile phone to automatically shut down, or even burn out the internal chip. However, the information in this regard has not been confirmed and is still rumored.

 

Destroy the SIM card

The hacker launched the direct destruction of the SIM card through the vulnerability of the information access length of the early SIM card.

 

Money Loss

After various malicious attacks on PCs began to be linked to monetary benefits, this trend has inevitably developed on mobile phones. Such attacks range from increasing telephone charges to causing serious losses in online transactions.

 

Increase SMS spending: Because it becomes a "text spammer" controlled by hackers, the cost of text messaging naturally rises. For example, flood hacking tools.

 

Automatic dialing

For example, in Japanese i-mode, after the user received a malicious MMS, he continuously dialed the Japanese emergency number 110, which not only caused a waste of social resources, but also increased the user's telephone cost.

 

Was transferred to an international call: through Pharming, the hacker directly tampered with the user's mobile phone address book, so that the user was inexplicably transferred to another country when making the call, which caused the user's phone bill to rise.

 

Tampering with order information

Symantec said that nowadays, users who buy stocks through mobile phones are increasingly buying users. So in the future there may be hackers based on certain interests, such as speculation on specific stocks, and then tampering with the user's Order information, which in turn causes users to buy the wrong order or cause investment losses.

 

Confidentiality injury

The ultimate goal of any security protection is to ensure the security of confidential information, so the leakage of confidential information caused by mobile phone viruses can be said to be the most destructive behavior.

 

Stealing calendar or address book

Disguise software or games with backdoor programs as legal software or free software, and trick users into downloading, thereby stealing important data such as calendar or address book.

For example, in the hotel industry, the phone book of the Paris Hilton was stolen under some unknown conditions.

Later, according to expert research, it may be caused by the intrusion of hackers through the Bluetooth transmission channel.

 

Stealing personal privacy photos

In the future, it will not be ruled out that hackers will steal the privacy photos of celebrities through Bluetooth, WiFi or other methods, so as to intimidate or defraud.

 

Online transaction data leakage

Today, online banking or online transactions can also be carried out through mobile phones, so related information may also be exposed to the risk of mobile phone viruses or hacker attacks.

 



> SHARE this article >>

How many of the several major symptoms of viruses in mobile phones you know?

Smartphones have brought a lot of convenience to our lives, and we can accomplish many things through various apps and gadgets in our phones. However, we all know that everything has two sides, and there are advantages and disadvantages. With the increase of applications, applications that threaten the security of mobile phones will also increase, and personal privacy such as our cash accounts will be stolen if you are not careful. Therefore, today I have compiled a few characteristics of viruses that can appear in mobile phones, you can find out.

 

Inexplicable deduction

I don’t know if you have paid attention to the deduction of your mobile phone. When the phone is inexplicably deducted, the cost within a few days is several times the normal cost. It may be that the virus is playing ghosts.

There are two possibilities, one is malicious deduction virus, you accidentally click on a link to automatically deduct the fee, and another possibility is that the virus runs in the background, consuming a lot of traffic, resulting in increased costs.

 

The mobile phone consumes power quickly and heats up

In the process of using our smart phones, there are situations such as fast power consumption and fever, which depends on the situation. If the phone consumes power and heat quickly when installing APP, synchronizing data or playing games, this is normal, and this is our autonomous behavior.

 

Mobile phone Wangtian Virus

But if our mobile phone is in our pocket, or if we are not going to use it, it will inexplicably consume power and heat, and we must pay special attention. 

It is very likely that our mobile phone has been infected with a Trojan horse virus. The virus is stealing our personal privacy and uploading it independently, which will cause the mobile phone to consume electricity and heat quickly.

 

Frequent advertising pop-ups

When we use mobile phones, advertising pop-ups may appear only when entering the corresponding shopping page. Generally, when using other types of software, the mobile phone pages are very clean.

However, no matter what operation is performed on the software infected with the mobile phone virus, the mobile phone will continuously pop up advertisements.

Even if the background push of the mobile phone software is turned off, a large number of advertisements cannot be avoided.

 

Increased battery consumption

With the development of mobile phones, the battery storage capacity of mobile phones is longer than before. 

But if you notice that the speed of battery power consumption of the mobile phone suddenly increases abnormally, then you should start to pay attention, because at this time your mobile phone may already be a virus program running in the background.

Of course, most viruses are very covert and don’t easily reveal their existence.

They usually only run in the background, which may be the reason for your phone’s sudden and rapid power consumption. Of course, it does not rule out the existence of hardware and battery aging factors, but it is better to be cautious if you have problems.

 

Automatic phone call / text

May be you have encountered such a situation, the phone automatically calls or texts. Some people may think that this happens when the phone is accidentally touched when it is in your pocket.

In fact, this is only one aspect. If there are many such phenomena, then it is possible that the virus is doing it.

 

The above is the phenomenon that several types of mobile phone poisoning will occur, do you remember?

Network security is an issue that every one of us must pay attention to.

The network brings us convenience and the dangers that will accompany it. Regarding network security, if you still want to say something, you are welcome to add a message in the comment area below, thank you.




> SHARE this article >>

United Nations Department of Disarmament Affairs (DDA)

aka UN Department for Disarmament Affairs-DDA


What is the Date of establishment of United Nations Department of Disarmament Affairs (DDA)?

The earliest was the Disarmament Center of the United Nations Secretariat.

In 1983, it was renamed the United Nations Department of Disarmament Affairs. In 1993, it was renamed the United Nations Disarmament Affairs Division.

 

What are the main function of United Nations Department of Disarmament Affairs What are the DDA)?

The UN’s functional agency in charge of disarmament:

  • Provides services to the UN General Assembly and its First Committee, Disarmament Commission and the Conference on Disarmament
  • Prepares publications on disarmament issues
  • Tracks and evaluates the development of the international disarmament situation
  • Manages the Disarmament Research Fund, Providing training and consulting services
  • Providing guidance and coordination for global disarmament advocacy activities
  • and managing regional disarmament centers

 

USN-DDA United Nations Department of Disarmament Affairs (DDA)

Principal of United Nations Department of Disarmament Affairs (DDA)

Nobuyasu Abe (Japanese), who succeeded Dhanapla (Sri Lankan) as the deputy secretary-general of the United Nations for disarmament affairs in July 2003.

 

Where is the Headquarters of United Nations Department of Disarmament Affairs (DDA)

In New York, USA. Website: http: // disarmament. un. org / dda. htm

 

What are the Publications of United Nations Department of Disarmament Affairs (DDA)?

"United Nations Disarmament Yearbook", "Disarmament, United Nations Periodic Review", "Disarmament Newsletter" and monographs.

 

May refer to Related topics

· International organizations, intergovernmental multilateral mechanisms and international conferences




> SHARE this article >>

Chinese National Security Education Day

National Security Education Day is a festival set up to enhance national awareness of national security and maintain national security. On July 1, 2015, Article 14 of the National Security Law of the People's Republic of China passed by the Standing Committee of the National People's Congress stipulates that April 15 is the National Security Education Day for all.

On April 7, 2020, the Ministry of Justice and the National Law Popularization Office jointly issued a notice to deploy a nationwide national security education day publicity campaign for the 2020 National Security Education, raise awareness of national security and the rule of law, create a strong rule of law atmosphere for national security, and strengthen prevention And the ability to resist security risks.

The theme of this year's event is "Adhere to the overall national security concept, coordinate traditional and non-traditional security, and provide a strong guarantee for a decisive victory in building a well-off society in an all-round way."

 

On April 14, the national security education day theme exhibition of "People's Safety and Security in Chang'an" officially opened at Guangxi University.

The exhibition is produced by the national security agency and is divided into 18 sections. It has a systematic review of the national security leadership mechanism, the overall national security concept, the legal security system, and the memorabilia.

 

Chinese name:    National Security Education Day for All

Global name:    National Security Education Day

Date:    April 15

Implementation time:    April 15, 2016

Establish laws:    "National Security Law of the People's Republic of China"

Report a call:    12339

 

Table of Content

    1 Setting background

    2 Realistic meaning

    3 Legal obligations

    4 Activities around

 

National Security Law passed by the Standing Committee of the National People's Congress

On July 1, 2015, the National Security Law passed by the Standing Committee of the National People's Congress stipulated that national security refers to the relative absence of state power, sovereignty, unity and territorial integrity, people's well-being, sustainable economic and social development, and other major national interests.

 A state of danger and freedom from internal and external threats, and the ability to guarantee a sustained state of security.

The state strengthens national security news propaganda and public opinion guidance. Carry out national security publicity and education activities in various forms.

Incorporate national security education into the national education system and civil servant education and training system to enhance the national security awareness of the whole people.

National security work should adhere to the overall national security concept, with people’s security as the purpose, political security as the basis, economic security as the basis, military, cultural and social security as the guarantee, and international security as the basis to maintain national security in all fields.

To build a national security system and take the road of national security with Chinese characteristics.


China is faced with the dual pressures of maintaining national sovereignty, security, and development interests externally, and maintaining political security and social stability internally.

Various predictable and unpredictable risk factors have increased significantly, and non-traditional security has become increasingly prominent.

A comprehensive, comprehensive and basic national security law is necessary to cope with the new situation of national security.

 

The Thirteenth Five-Year Plan outlined the need to thoroughly implement the overall national security concept and implement the national security strategy. It is necessary to formulate and implement national security policies in key areas such as politics, land, economy, society, resources, and networks, to protect the sovereignty and security of the national regime, to prevent and resolve economic security risks, and to strengthen national security and the rule of law.


 

Public health safety

 

The

National Security

The

Comprehensive well-off

People's safety

Biosecurity

Political security

 

Realistic meaning

First, it is conducive to the implementation of the "overall national security concept" put forward by General Secretary Jin Ping. On April 15, 2014, General Secretary Xi Jinping clearly put forward the "overall national security concept" for the first time at the first meeting of the Central National Security Committee.

This is the fundamental policy of the Communist Party of China in safeguarding national security in the new period.


The National Security Law stipulates:

National security work should adhere to the overall national security concept, with people’s security as the purpose, political security as the basis, economic security as the basis, military, cultural and social security as the guarantee, and promotion of international security as the basis:

·       Maintain national security in various fields.

·       Build a national security system

·       Take the road of national security with Chinese characteristics

The broad public participation in the National Security Education Day for All will have good results in promoting the overall national security concept.

Secondly, it is conducive to raising the legal awareness of the government and the public to maintain national security.

The Chinese National Security Education Day

The National Security Law uses the "total national security concept" as the guiding ideology, stipulates a series of national security systems different from the traditional national security concept, extends the connotation of national security to all fields of politics, economy, culture and society, and emphasizes the maintenance National security is not just the task of specialized agencies.

But the obligations and responsibilities of all state agencies, social organizations, and citizens.

Through a series of activities of the National Security Education Day for all, the government and the public can effectively understand the requirements of the National Security Law, thereby strengthening the sense of responsibility and improving everyone ’s ability to maintain national security.

Finally, it is conducive to enhancing the effect of national security law popularization. The National Security Law establishes the National Security Education Day for All to concentrate the dissemination of national security knowledge to the public, so as to achieve a good publicity effect in a short period of time, and allow more public to contact and understand the national security aspects.

Legal knowledge, especially how to perform their duties and obligations in maintaining national security according to law.

The National Security Law establishes the National Security Education Day for All.

The most important practical significance is to mobilize the government and the whole society to participate in the work of maintaining national security. Maintaining national security is closely related to everyone’s vital interests.

Taking the people’s security as the purpose is also the core value of the “overall national security concept”.

Only when everyone participates and everyone is responsible can national security truly gain a huge foundation of people's character and have a solid system guarantee.

In-depth study and promotion of General Secretary Xi Jinping’s new concept of comprehensively governing the country in accordance with law, new ideas and new strategies, and important exposition on adhering to the overall national security concept.

Vigorously publicize the Constitutio ’s basic obligations concerning citizens ’safeguarding the security, honour and interests of the motherland, and in-depth publicize national security laws and cyber security laws, anti-terrorism laws, anti-espionage laws, nuclear security laws and other national security laws.

Focusing on the prevention and control of the new coronary pneumonia epidemic in accordance with the law, the Law on the Prevention and Control of Infectious Diseases, the Emergency Response Law, the Wildlife Protection Law, and the Frontier Health and Quarantine Law and other laws and regulations are widely publicized. Great publicity efforts have formed a strong atmosphere for safeguarding national security throughout the society.


Legal obligation

Regarding the obligations of social organizations and individual citizens in maintaining national security, Article 77 of the National Security Law clearly stipulates the following aspects:

(1) Observe the relevant provisions of the Constitution and laws and regulations on national security;

(2) Report harm to the state in a timely manner Clues to security activities

(3) truthfully provide evidence that is known to endanger national security activities

(4) provide convenient conditions or other assistance for national security work

(5) provide to national security agencies, public security agencies and relevant military agencies Necessary support and assistance

(6) Keeping known state secrets

(7) Other obligations stipulated by laws and administrative regulations.

In addition, the article clearly stipulates that no individual or organization shall endanger national security or provide any assistance or assistance to individuals or organizations that endanger national security.

 

Activities around National Security Education Day

On April 12, 2016, to welcome the first national security education day for all people, Hebei Jizhou City widely spread national security knowledge among elementary and middle school students, by inviting revolutionary veterans to the campus, making explanation posters, etc., to tell the children The importance of national security raises children's awareness of national security.

In April 2020, the Ministry of Justice and the National Law Popularization Office jointly issued a notice to deploy nationwide popularization activities for the 2020 National Security Education Day.

The theme of the event in 2020 is "Adhere to the overall national security concept, coordinate traditional and non-traditional security, and provide a strong guarantee for a decisive victory to build a well-off society in an all-round way."

The notice requires that we focus on the promotion and education of national security and the rule of law among leading cadres and young people.

Combined with the special law propaganda actions of "Prevention and Control of Epidemic Situation and the Rule of Law", publicity safety, biosecurity and other law propaganda efforts were strengthened.

Innovate the form of propaganda, adhere to the combination of online and offline, and continuously improve the influence and dissemination of national security and law propaganda.

On April 14, 2020, the theme exhibition of "National Security Education Day in Chang'an" will be officially opened at Guangxi University. The exhibition is produced by the national security agency and is divided into 18 sections.

It not only systematically sorts out the national security leadership mechanism, the overall national security concept, the legal security system, and the memorabilia, but also introduces the national security work tasks in various key areas and shows all levels.

The measures and typical cases of organs to safeguard national security are a rare and fresh textbook of national security education with distinctive characteristics of the times.



> SHARE this article >>

Contact Form

Name

Email *

Message *

Powered by Blogger.
Javascript DisablePlease Enable Javascript To See All Widget